SHIFT to Swift

, Pavan Kumar, Swift

SHIFT to Swift

An Unusual Journey from Objective-C

Table of Contents

  • Who should read this document?
  • Objective-C to Learning Swift
  • About Swift
  • Why Swift?
  • Swift vs Objective-C
  • Difference
  • Swift and Objective-C Interoperability
  • Case Study
  • Conclusions

Rakuten Technology Conference 2017

, Masaya Mori, announce

Message from Chairperson

On the opening of Rakuten Technology Conference 2017

    This year happily marks the 11th anniversary of Rakuten Technology Conference which we have been hosting since 2007 thanks to your continued support. This conference is planned and operated by Rakuten engineers each year with a theme relative to innovation trends.

Kubernetes Traffic Routing - Part 2 of 2



    This blog explains the details of Ingress, which is one of the ways to expose Pods running in K8S cluster to outside the world, what is Ingress and it’s fundamental concept and major features.
    By the end, you will learn what you benefit from Ingress.

Kubernetes Traffic Routing - Part 1 of 2


    This blog introduces multiple ways how Kubernetes (a.k.a K8S) routes inbound traffic from outside of K8S cluster in a practical manner. By the end, you will get some input to achieve K8S loadbalancer function as the best practice.

Rakuten's Journey to HTTPS

, William Moore, HTTPS

Rakuten’s Journey to HTTPS – Lessons So Far

Rakuten group is currently migrating its services to HTTPS; any service that uses HTTP is being migrated to HTTPS. This includes not just websites but also our mobile applications and other services we offer, for example ad and content services. This work is still ongoing, however globally over 80% of Rakuten’s services had completed their migration by March 2017. We wanted to share our lessons for managing such a large scale migration.

Security Team's activities with the academic world

Self Introduction

Hello, World, this is Yu-Lu “Chris” Liu, I am the Office Manager of the IT Security Engineering Office, the technical security team at Rakuten, Inc. (hereby Rakuten). I am also a member of Rakuten-CERT. I would like to share about our on-going activities with universities. We believe we are nourishing the next generation of security pioneers, and contributing to society while protecting Rakuten’s users.

The Fight Against Cybercrime



  In recent times, as our reliance on technology increases, so does the threat of online cybercrimes.Online Criminals are dedicated to stealing your online personal information and identification. Important details like user IDs, passwords, credit card or bank information as well as personal information are all at risk of theft from cybercriminals. These online thieves utilize phishing emails, or fraudulent websites as their methods of attack. Whether through email or the web, cybercriminals are sophisticated in making their attacks appear as if they are legitimate websites or messages. The even utilize phishing email schemes, to appear as though they are sent from Rakuten. One real-world example of this is an email that appeared to be sent from Rakuten with the email subject “Congratulations”. These cybercriminals attempted to lure the user with a promise of a prize by inputting their personal information into a fraudulent website. These falsified websites are artistically deceitful as they are often meticulously modeled after Rakuten, utilizing Rakuten’s logo, merchandise photos and descriptions taken directly from one of Rakuten’s services. These websites even feature an e-commerce shopping basket, helping to craft the illusion they are a legitimate service. Of course, no order will ever actually ship. This occurrence becoming more and more common has made all users question the safety and security of online services.

New capability of Docker - Moby & LinuxKit



  This blog introduces what and why Moby & LinuxKit and it’s fundamental concept and major featres. By the end, you will learn what you can benefit from Moby & LinuxKit.

Virtual Reality with Physical Space is the next media for Rakuten


  If you’re an old-fashioned romantic, there’s no better time to express your love for that special someone than Valentine’s Day. Some Romeos go beyond the traditional chocolates and roses and offer their Juliets an engagement ring. But even if you don’t pop the question on February 14, all the work involved in planning a wedding can take away from the high of getting hitched. Researchers at Rakuten Institute Technology, though, are taking some of the pain out of the process with a platform that allows users virtual previews of possible venues for the big day.

Machine learning applications in the e-commerce domain (4)


(Continued from the previous chapter)

Deep learning

  In relation to deep learning, the two-layer network Word2Vec developed by Google was revolutionary. If you input text, you can obtain a vector set as the output, i.e., the feature vector of words in the text. By grouping the words and creating vectors, you can make judgments on similarity, and infer the meaning. Since it uses figures, it is scalable by processing in parallel and this is one of the great advantages of Word2Vec. It is not only applicable to the field of text analysis, but to any kind of data. At Rakuten, we have developed an extended version called Category2Vec and have released it as OSS (ref: We are training it with various kinds of EC data and are beginning to see the possibility of application on a broad scale for product/user analysis and categorization, and estimation of loss data. While Word2Vec is not deep learning itself, it is worth understanding this as a technology in numerical form that can be used in a deep neural network.